top of page
Search


Automated Cyber Weapons: The Cobalt Strike Bug, And The Dangers of Automation
What if sophisticated Penetration Testing and cyber defence tools can be turned against us? A Cobalt Strike bug shows it's possible.

Wembley Partners
Aug 12, 20215 min read
Â
Â
Â


An Inside Look Into Black Hats, Motives, and Cybercrime: Ideologies Explained
Is the world as black and white as the proverbial "hats" that hackers wear? We explore the topic with the hacktivist group, GhostSec.

Wembley Partners
Jul 15, 20216 min read
Â
Â
Â


What are the Use Cases for Cyber Threat Intelligence?
We've discussed Cyber Threat Intelligence in depth this May. Now, let's talk about specific areas where CTI makes a meaningful difference.

Wembley Partners
May 28, 20215 min read
Â
Â
Â


So, We Have A Cyber Incident Response Program. What’s Next?
While having a decent Cyber Incident Response Program is absolutely essential, it's not a panacea. How can you boost its effectiveness?

Wembley Partners
Apr 29, 20214 min read
Â
Â
Â


Components of a World-Class Cyber Incident Response Program
You've heard the term. But what does a truly world-class Cyber Incident Response program look like?

Wembley Partners
Apr 22, 20213 min read
Â
Â
Â


Whose Job is it to Respond to Cyber Incidents Anyway?
It is a common misconception to perceive cyber defense as a purely technical matter. The reality is, cybersecurity is a holistic function.

Wembley Partners
Apr 15, 20215 min read
Â
Â
Â


What Is a Cyber Incident Response Program and Do I REALLY Need One?
You’re preparing to leave the office on a cool Tuesday afternoon when your desk phone beeps. It’s your IT guy, and it isn't good news.

Wembley Partners
Apr 8, 20214 min read
Â
Â
Â


The Facebook Breach: Everything You Need To Know
While families spent the weekend unwrapping their Easter chocolate, cybercriminals were unwrapping a treat of an entirely different nature.

Wembley Partners
Apr 6, 20215 min read
Â
Â
Â
bottom of page